¡¾Îó²îͨ¸æ¡¿glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²î (CVE-2025-4802)

Ðû²¼Ê±¼ä 2025-05-20

Ò»¡¢Îó²î¸ÅÊö


Îó²îÃû³Æ

glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²î

CVE   ID

CVE-2025-4802

Îó²îÀàÐÍ

´úÂëÖ´ÐÐ

·¢Ã÷ʱ¼ä

2025-05-20

Îó²îÆÀ·Ö

9.8

Îó²îÆ·¼¶

ÑÏÖØ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

ÎÞ

ʹÓÃÄѶÈ

µÍ

Óû§½»»¥

²»ÐèÒª

PoC/EXP

δ¹ûÕæ

ÔÚҰʹÓÃ

δ·¢Ã÷


setuid¶þ½øÖÆÎļþÊǾßÓÐÌØÊâȨÏ޵ijÌÐò£¬£¬£¬£¬£¬ £¬¿ÉÒÔÒÔÎļþÓµÓÐÕßµÄÉí·ÝÖ´ÐС£¡£¡£dlopenÊÇÒ»¸ö¶¯Ì¬¼ÓÔØ¿âµÄº¯Êý£¬£¬£¬£¬£¬ £¬Í¨³£ÓÃÓÚÔÚÔËÐÐʱ¼ÓÔØ¹²Ïí¿â¡£¡£¡£


2025Äê5ÔÂ20ÈÕ£¬£¬£¬£¬£¬ £¬bevictorΰµÂ¼¯ÍÅVSRC¼à²âµ½glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²îCVE-2025-4802¡£¡£¡£¸ÃÎó²î±£´æÓÚGNU C¿â£¨glibc£©ÖУ¬£¬£¬£¬£¬ £¬Ó°Ï쾲̬Á´½ÓµÄsetuid¶þ½øÖÆÎļþ¡£¡£¡£Îó²îÔ´ÓÚ¾²Ì¬setuid³ÌÐòÔÚŲÓÃdlopenʱ¹ýʧµØÊ¹ÓÃLD_LIBRARY_PATHÇéÐαäÁ¿²éÕÒ¹²Ïí¿â£¬£¬£¬£¬£¬ £¬¿ÉÄܵ¼Ö¼ÓÔØ¶ñÒâ¿â²¢Ö´Ðй¥»÷Õß¿ØÖƵĴúÂë¡£¡£¡£¸ÃÎó²îµÄ¿ÉʹÓÃÐԽϵͣ¬£¬£¬£¬£¬ £¬ËüÒªÇó³ÌÐòΪ¾²Ì¬Á´½ÓµÄsetuid³ÌÐò£¬£¬£¬£¬£¬ £¬²¢ÇÒŲÓÃdlopen¡£¡£¡£Îó²î¼¶±ðÑÏÖØ£¬£¬£¬£¬£¬ £¬Îó²îÆÀ·Ö9.8·Ö¡£¡£¡£


¶þ¡¢Ó°Ïì¹æÄ£


ÔËÐÐglibc°æ±¾Îª2.27ÖÁ2.38µÄLinuxϵͳ£¨ÈçRocky Linux¡¢Debian¡¢UbuntuµÈ£©¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬£¬ £¬ÌØÊâÊÇʹÓþ²Ì¬setuid¶þ½øÖÆÎļþµÄϵͳ¡£¡£¡£


Èý¡¢Çå¾²²½·¥


3.1 Éý¼¶°æ±¾


¹Ù·½ÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬½¨ÒéÊÜÓ°ÏìÓû§¾¡¿ìÉý¼¶µ½glibc 2.39»ò¸ü¸ß°æ±¾¡£¡£¡£
ÔÚDebian/UbuntuϵͳÖУºsudo apt update && sudo apt upgrade libc6
ÔÚRocky Linux/CentOSϵͳÖУºsudo dnf update glibc


3.2 ÔÝʱ²½·¥


ÔÝÎÞ¡£¡£¡£


3.3 ͨÓý¨Òé


? °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¡£¬£¬£¬£¬£¬ £¬ïÔ̭ϵͳÎó²î£¬£¬£¬£¬£¬ £¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£
ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬ £¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬ £¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬ £¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬ £¬ïÔÌ­¹¥»÷Ãæ¡£¡£¡£
ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬ £¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£
ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬ £¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬£¬£¬£¬£¬ £¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£
ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£


3.4 ²Î¿¼Á´½Ó


https://www.openwall.com/lists/oss-security/2025/05/17/2
https://sourceware.org/bugzilla/show_bug.cgi?id=32976